Search This Blog

Tuesday, March 17, 2009

Kraken the botnet: The ethics of counter-hacking

Why TippingPoint held back from destroying the Kraken botnet
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Trend Micro
rule

Keeping Bad Content Off your Net.
You can ensure your gateway process 50% to 70% less traffic with a hybrid approach to security. Discover how in this IDC whitepaper. Keep malware in the cloud with protection services that filter out spam, malicious websites and questionable material before it ever hits your gateway. Download this whitepaper now.

rule

Spotlight Story
Kraken the botnet: The ethics of counter-hacking

M. E. Kabay By M. E. Kabay
The Kraken is a huge network of personal computers that have been infected with software that turns them into zombie systems under the control of a master program - a botnet. The Kraken botnet is used by criminals to generate spam. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Video: Hacker Joe Grand offers IT advice Joe Grand, a hardware hacker and host of Discovery's Prototype This! TV show, offers advice on how IT can share information with non-technical colleagues.

Researchers infiltrate Kraken botnet, could clean it out A group of security researchers Wednesday said they have infiltrated one of the world's biggest botnets and can snatch control of compromised machines from the hackers.

Slideshow: Tracking the botnets Shadowserver.org documents world drones activity. Not surprisingly, Beijing is a huge target. But the U.S. harbors a good share.

Internet-threat portal on tap from TippingPoint TippingPoint is beta-testing a Web portal that lets customers view Internet threat intelligence the company has gathered from around the globe, as well as polls of how other customers are dealing with those threats.

Arbor Networks bolsters Internet monitoring system More than 100 ISPs participating in Arbor Networks' ATLAS system share anonymous traffic data with one another on an hourly basis.

Microsoft didn't crush Storm, counter researchers Microsoft didn't crush the Storm botnet as it has claimed, rival security researchers argued today. Instead, the criminals responsible for the army of compromised computers diversified last year to avoid attention and ...

Security management: 3 key considerations What should you ask when buying security information management software?

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by Trend Micro
rule

Keeping Bad Content Off your Net.
You can ensure your gateway process 50% to 70% less traffic with a hybrid approach to security. Discover how in this IDC whitepaper. Keep malware in the cloud with protection services that filter out spam, malicious websites and questionable material before it ever hits your gateway. Download this whitepaper now.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


IDC Software as a Service Summit
The IDC Software as a Service Summit brings together senior IT and line of business executives to learn how SaaS and SaaS in a cloud present new opportunities that enable significant cost savings, agility, speed and achieve overall business value despite the turbulent business climate.
Find out more!

 

03/17/09

Today's most-read stories:

  1. BMC's role in Unified Computing System launch
  2. 10 iPhone apps that could get you into trouble
  3. Cisco quietly downsizing through outsourcing
  4. Cisco unveils "unified computing system," blade server
  5. Cisco's data-center push holds promise, perils
  6. 15 free downloads to pep up your old PC
  7. Sharp turns like Cisco's have a long history
  8. Will the real mobile enterprise device please stand up?
  9. Sale of key Nortel assets may be inevitable
  10. Authentication with a twist
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: